Exploring TASE 2.0 & ICCP: Key Protocols in ICS/SCADA Networks (2024)

Critical infrastructure

Introduction

Telecontrol Application Service Element (TASE) 2.0 is also known as Inter Control Center Protocol (ICCP) or International Electrotechnical Commission (IEC) 60870-6, but they are more commonly referred to as ICCP. Since different vendors had their own custom and proprietary protocols, there was a need for a common protocol for communication and data exchange between different control centers. Keeping this in mind, ICCP/TASE 2.0 was designed.

Unlike Modbus, which was designed for serial communication, ICCP has been designed specifically for communication over LAN (Local Area Network) and WAN (Wide Area Network). ICCP is used in communication between different control centers, power pools, sub-stations, other utilities and non-utility generators.

The International Electrotechnical Commission (IEC) and the International Standards Organization (ISO) has adopted ICCP in the following international standard forms:

  • TASE.2 Services and Protocol (IEC 60870-6-503)
  • TASE.2 Object Models (IEC 60870-6-802)
  • TASE.2 Application Profile (IEC 60870-6-702).

ICCP major role and functionality in an ICS/SCADA network

ICCP is chiefly used in an ICS/SCADA network for performing following functionalities:

  1. Connection establishment
  2. Reading and accessing information from the end server
  3. Transmission of information from one control center to another
  4. Notifications: Changes, alarms or if any exception condition occurs
  5. Remote device configuration
  6. Control of remote devices and operating programs

ICCP architecture and working

ICCP is a kind of client-server model protocol and widely used for client-server communication between control centers. ICCP allows the exchange of real-time data like measured values, scheduling data, operator messages and energy accounting data. The server contains application data and predefined functions for connection establishment and communication. The client issues a request to the server for reading, accessing and modifying the resource and data present on the server using ICCP protocol.

Client and server may be located in different control centers; in this case, ICCP is integrated into a control system provided via gateway product or as software for communication between different control centers. ICCP basically defines predefined communication format and syntax for smooth client-server communication and interoperability between two or more control centers. What HTTP is to the browser-server communication model for the internet, ICCP is to the client-server communication model in an ICS/SCADA network.

Although ICCP was primarily a unidirectional client/server protocol, modern implementations support bidirectional communication over the same connection line. ICCP functions at the transport layer of the ISO/OSI model (Open Systems Interconnection model) and runs on port number 102.

Authorization and access control

Since ICCP is responsible for sending and receiving data between two or more control centers, proper access control and authorization must be defined and implemented for accessing and modifying the data between two or more control centers. ICCP does this by maintaining a record in a table named “Bilateral Tables.”

A Bilateral Table implements proper rules and agreement for accessing data between two or more control centers. Whenever a new request is received for accessing the data, ICCP refers to Bilateral Tables and accordingly accepts or rejects the request based on the predefined rule sets in the table.

Security issues

Like other ICS/SCADA protocols, ICCP has shortcomings when talking about security. ICCP is susceptible to session hijacking, spoofing because of following security concerns:

  1. No authentication and encryption: ICCP does not provide authentication and encryption. Authentication and encryption are usually managed by low-level protocols. A secure ICCP version also exists but has not been widely deployed/implemented
  2. Lack of security for Bilateral Tables: ICCP does not implement enough security for Bilateral Tables. If an attacker is able to access and modify the entries, he can access and modify the data of any control center
  3. Accessibility: Since ICCP is a Wide Area Network protocol, it makes ICCP susceptible to attacks like MITM (Man-in-the-Middle), DoS and DDoS

Security recommendations for an ICCP network

The following are the few of the guidelines for protecting a network where ICCP is being used:

  1. Secure ICCP should be used to prevent authentication and encryption
  2. Timely penetration testing should be performed for an ICCP network since a number of issues have been found in ICCP networks
  3. Servers should be patched, and hardening should be done
  4. Extra attention should be paid while implementing Bilateral Tables
  5. All authentication and authorization to the server should be guarded and monitored using IDS/IPS and a firewall. Digital Bond has Snort-compatible IDS signatures for detecting various attacks related to ICCP

Conclusion

ICCP is one of the best and most viable options currently for implementing and managing communication between two or more control centers, and it is widely being used in ICS/SCADA networks. If given a choice, ICCP should be preferred because of the interoperability between two control centers; however, all of the security concerns and issues should be properly addressed before implementation in any network.

Exploring TASE 2.0 & ICCP: Key Protocols in ICS/SCADA Networks (2)

Learn ICS/SCADA Security Fundamentals

Build your SCADA security skills with six hands-on courses covering access controls, common cyber threats, process control networks and more.

Start Learning

Sources

  1. IEC 60870-6-593, IEC
  2. Inter-Control Center Communications Protocol (ICCP, TASE.2): Threats to Data Security and Potential Solutions, EPRI
  3. The LiveData ICCP Server: A Configuration-Driven ICCP Solution that Minimizes Code Development, LiveData
  4. Secure ICCP Integration Considerations and Recommendations, Sandia National Laboratories
Exploring TASE 2.0 & ICCP: Key Protocols in ICS/SCADA Networks (2024)

FAQs

What is the ICCP protocol Tase 2? ›

IEC 60870-6 TASE. 2 (or the Inter-Control Centre Communications Protocol – ICCP) is an international standard for exchanging data between control centres, utilities, power pools and generators. Compliance is a key factor in ensuring telecontrol systems are interoperable.

What is the ICCP protocol in SCADA? ›

ICCP, or TASE. 2 protocol, allows for the exchange of real-time and historical data including status, measured values, scheduling data, operator commands, and more. The ICCP protocol is based on Manufacturing Message Specification (MMS or ISO 9506) and allows for both client and server roles.

What port does ICCP protocol use? ›

ICCP functions at the transport layer of the ISO/OSI model (Open Systems Interconnection model) and runs on port number 102.

What is the Icccp protocol? ›

ICCP (Inter-Control Center Communications Protocol) is a standard protocol for communications between control centers, which is part of the IEC 60870–6 standard under the name of TASE. 2 Telecontrol Application Service Element 2.

How is ICCP working? ›

How does an impressed current work? Impressed current cathodic protection (ICCP) systems consist of Mixed Metal Oxide (MMO) coated titanium anodes that are connected to an external power source. This power source provides the current that leads to the electrochemical reaction required for cathodic protection to occur.

What does an ICCP system do? ›

An impressed current cathodic protection controls the corrosion of a metal surface by making it the cathode of an electrochemical cell. The method of protection connects the metal to be protected to a more easily corroded "sacrificial metal" to act as the anode.

What is the best protocol for SCADA? ›

Modbus and DNP3 are two of the most common protocols used in SCADA networks. Modbus is open source, and 80-90% of plant devices (inverters, trackers, etc.) "speak" Modbus protocol. DNP3 is a newer protocol that is primarily used to communicate between different substation devices in the SCADA system.

What does ICCP stand for? ›

Executive Summary. The Inter-control Center Communications Protocol (ICCP) was developed to enable data exchange over Wide Area Networks between utility control centers, Independent System Operators (ISOs), Regional Transmission Operators (RTOs), and other Generators.

Why do we stop ICCP in port? ›

Why ICCP is switched off in port? The ICCP system is stopped in harbours and fresh waters. In fresh waters, since the water becomes a less potent electrolyte, there is no need for the ICCP system. Whereas in harbours, the ICCP system will attempt to protect the harbour along with the ship's hull and overload itself.

What layer of OSI is ICCP? ›

ICCP is executed at the top of the Application Layer in the OSI model. This protocol operates over LAN and WAN networks to allow for the exchange and monitoring of time sensitive critical control data.

What is an ICCP connection? ›

ICCP (Inter-Control Center Communications Protocol), also known as TASE. 2 or IEC 60870.6 is an international standard, which is used to transmit data and communicate between control centres. It is used for management of the generation, transmission and distribution of power in a power grid.

What is the difference between ICCP and secure ICCP? ›

Secure ICCP is simply ICCP tunneled via transport layer security (TLS). In other words, it is certificate-based and has some additional protocol message signing.

What is 7 protocol? ›

Layer 7 provides application services for network software services based on level 7 protocols such as HTTP and SMTP, including file transfers, email, web browsing, and top-level API calls and responses.

What is the Iccms protocol used for? ›

Review, monitoring for caries prevention and management: ICCMS™ differentiates between monitoring of initial lesions to check their progression status and providing preventive interventions, and reviews of behavioral and oral hygiene change plans as well as consultation with other health care providers.

What is the EasyComm 2 protocol? ›

The EasyComm 2 standard is an enhanced protocol to allow full station control and also feedback from external systems. The host PC issues commands to the controller by sending a 2 character command identifier followed by the command value. Commands are separated by either a space or carriage return or linefeed.

What is the Layer 2 protocol used for? ›

The OSI Layer 2 protocol is described as a procedure used to regulate communications at the Data Link Layer. Examples are Ethernet used in cable networks, Point-to-Point Protocol (PPP), HDLC and ADCCP for point-to-point (dual-node) connections, as well as the Wi-Fi protocol used in wireless.

What is the protocol of Sercos II? ›

Communication protocol

In a SERCOS II network, all slaves simultaneously receive a message containing a command, which is called a master synchronization telegram (MST), and then simultaneously receive a master data telegram (MDT). The MDT contains cycle data.

What is the 2 phase control protocol? ›

The two phases of the two-phase protocol are:
  1. Growing phase: During the growth phase, new locks on data items may be acquired, but none can be released.
  2. Shrinking phase: Existing locks may be released, but no new locks can be acquired during the shrinking phase.
May 4, 2024

What is the LSV 2 communication protocol? ›

LSV-2 is a communications protocol that enables two-way command and data transfer in control systems. It's offered by Heidenhain and is available for numerous applications. Heidenhain specializes in controls for milling and turning machines, among other equipment, within the CNC industry.

Top Articles
Solana Price | SOL Price Index, Live Chart and USD Converter - Binance
404 Error Page
Hannaford Weekly Flyer Manchester Nh
Tesla Supercharger La Crosse Photos
Booknet.com Contract Marriage 2
Ross Dress For Less Hiring Near Me
Ds Cuts Saugus
Chris wragge hi-res stock photography and images - Alamy
A Complete Guide To Major Scales
Craigslist Nj North Cars By Owner
David Packouz Girlfriend
Rochester Ny Missed Connections
Nestle Paystub
Palace Pizza Joplin
Craigslist Pets Southern Md
Cnnfn.com Markets
Think Up Elar Level 5 Answer Key Pdf
Current Time In Maryland
Morgan And Nay Funeral Home Obituaries
How To Cut Eelgrass Grounded
Jenn Pellegrino Photos
Pizza Hut In Dinuba
Hennens Chattanooga Dress Code
Earl David Worden Military Service
Leccion 4 Lesson Test
Drug Test 35765N
Panola County Busted Newspaper
Prey For The Devil Showtimes Near Ontario Luxe Reel Theatre
Chamberlain College of Nursing | Tuition & Acceptance Rates 2024
Обзор Joxi: Что это такое? Отзывы, аналоги, сайт и инструкции | APS
Dtm Urban Dictionary
Villano Antillano Desnuda
Lcsc Skyward
Play It Again Sports Forsyth Photos
Pfcu Chestnut Street
The Rise of "t33n leaks": Understanding the Impact and Implications - The Digital Weekly
Fastpitch Softball Pitching Tips for Beginners Part 1 | STACK
Tamilrockers Movies 2023 Download
Dr Adj Redist Cadv Prin Amex Charge
Studio 22 Nashville Review
A Comprehensive 360 Training Review (2021) — How Good Is It?
062203010
At Home Hourly Pay
Tinfoil Unable To Start Software 2022
Youravon Com Mi Cuenta
Benjamin Franklin - Printer, Junto, Experiments on Electricity
Jackerman Mothers Warmth Part 3
Walmart Listings Near Me
Lightfoot 247
Blog Pch
Uno Grade Scale
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 5730

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.